Search

Refine Results
Type
Program
Status
Country
Province
City
Program Specialty Area
Field of Testing
Period range

From

To

Displaying 721 - 732 of 773
Notice of Intent

Information security - Message authentication...

This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that...
Notice of Intent

Amendment 1 - Information technology - Security...

Scope: CAN/CSA-ISO/IEC 18033-3:12 (R2016) This part of ISO/IEC 18033 specifies block ciphers. A block cipher maps blocks of n bits to blocks of n bits, under the control of a key of k kits. A total of seven different block...
Notice of Intent

Switches for appliances - Part 2-6: Particular...

Clause 1 of IEC 61058-1:2016 is applicable except as follows. Addition: This part of IEC 61058 is a subset based on IEC 61058-1. The clauses outlined below are intended to address the specific requirements for switches...
Notice of Intent

Petroleum and natural gas industries -- Arctic...

ISO 35103:2017 gives requirements, specifications and guidelines to ensure that environmental monitoring in the offshore Arctic region is fit for purpose. The Arctic region includes the territory lying to the North of the...
Notice of Intent

Arc welding equipment – Part 5: Wire feeders

This part of IEC 60974 specifies safety and performance requirements for industrial and professional equipment used in arc welding and allied processes to feed filler wire. This document is applicable to WIRE FEEDERS and to...
Notice of Intent

Identification cards - Integrated circuit cards...

This document specifies security-related interindustry commands that are intended to be used for personal verification through biometric methods in integrated circuit cards. It also defines the data structure and data access...
Notice of Intent

Information security - Cryptographic techniques...

The ISO/IEC 15946 series specifies public-key cryptographic techniques based on elliptic curves described in ISO/IEC 15946-1. This document defines elliptic curve generation techniques useful for implementing the elliptic...
Notice of Intent

Information security, cybersecurity and privacy...

This document defines the assurance requirements of the ISO/IEC 15408 series. It includes the individual assurance components from which the evaluation assurance levels and other packages contained in ISO/IEC 15408-5 are...